exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 51 - 75 of 111 RSS Feed

Files Date: 2005-08-14 to 2005-08-15

mivaTax.txt
Posted Aug 14, 2005
Authored by Kristian Hermansen

The Miva store has a flaw where tax calculation can be bypassed.

tags | advisory
SHA-256 | 1d01c13dc921e88b57fdf3d00029318da56b748446d547d8daef6d751bd9f727
phpPoll.txt
Posted Aug 14, 2005
Authored by rash | Site svt.nukleon.us

PHP Poll Creator version 1.01 is susceptible to a remote file inclusion vulnerability.

tags | exploit, remote, php, file inclusion
SHA-256 | 5c581ce9d2cf8550744e983f08d2abe424320521a65513d2ece38d043791b222
javamailAPI.txt
Posted Aug 14, 2005
Authored by Thet Aung Min Latt | Site thetaung.amyanmar.com

JavaMail API versions 1.13, 1.2, and 1.3 are susceptible to multiple information disclosure vulnerabilities.

tags | exploit, vulnerability, info disclosure
SHA-256 | c3cb47c8dc22584e271b8f68818d84e69de37fd589266e971b46fb4442a3a31d
iDEFENSE Security Advisory 2005-05-24.5
Posted Aug 14, 2005
Authored by iDefense Labs | Site idefense.com

iDEFENSE Security Advisory 05.24.05-5 - Remote exploitation of a denial of service vulnerability in Ipswitch Inc.'s Imail IMAP server allows attackers to crash the target service thereby preventing legitimate usage. Version 8.13 and 8.12 are confirmed vulnerable. Earlier versions may be susceptible as well.

tags | advisory, remote, denial of service, imap
advisories | CVE-2005-1254
SHA-256 | d455c61f41de713d78f506feae80b9cdb938e88634bbc2cb59c35860836cbccf
iDEFENSE Security Advisory 2005-05-24.4
Posted Aug 14, 2005
Authored by iDefense Labs | Site idefense.com

iDEFENSE Security Advisory 05.24.05-4 - Remote exploitation of a directory traversal vulnerability in Ipswitch Inc.'s Imail Web Calendaring server allows attackers to read arbitrary files with System privileges. Version 8.13 is confirmed vulnerable. Earlier versions may be susceptible as well.

tags | exploit, remote, web, arbitrary
advisories | CVE-2005-1252
SHA-256 | c2412685d9447765878e88f041d94055c3ae9b7b48aaecf6311d4da8eea532c7
iDEFENSE Security Advisory 2005-05-24.3
Posted Aug 14, 2005
Authored by iDefense Labs | Site idefense.com

iDEFENSE Security Advisory 05.24.05-3 - Remote exploitation of several buffer overflow vulnerabilities in Ipswitch Inc.'s Imail 8.13 IMAP server allows attackers to execute arbitrary code with System privileges. The first vulnerability specifically exists in the handling of a long username to the LOGIN command. A long username argument of approximately 2,000 bytes will cause a stack based unicode string buffer overflow providing the attacker with partial control over EIP. As this vulnerability is in the LOGIN command itself, valid credentials are not required. Version 8.12 is confirmed vulnerable. Earlier versions may be susceptible as well.

tags | advisory, remote, overflow, arbitrary, vulnerability, imap
advisories | CVE-2005-1255
SHA-256 | 9f4c8c937937e246b73f6c5f56b49c2fa4b93c73ae1086201553c84363cd706d
iDEFENSE Security Advisory 2005-05-24.2
Posted Aug 14, 2005
Authored by iDefense Labs | Site idefense.com

iDEFENSE Security Advisory 05.24.05-2 - Remote exploitation of a denial of service (DoS) vulnerability in Ipswitch Inc.'s 8.13 IMail IMAP daemon allows attackers to cause 100 percent CPU use on the server, thereby preventing legitimate users from retrieving e-mail.

tags | advisory, remote, denial of service, imap
advisories | CVE-2005-1249
SHA-256 | a5edfc0b27df6ff1737295a9fee8adc88a51d14e0d51929410345acc43a5b540
iDEFENSE Security Advisory 2005-05-24.1
Posted Aug 14, 2005
Authored by iDefense Labs | Site idefense.com

iDEFENSE Security Advisory 05.24.05-1 - Remote exploitation of a buffer overflow vulnerability in Ipswitch Inc.'s Imail 8.13 IMAP server allows attackers to execute arbitrary code with System privileges. The vulnerability specifically exists in the handling of a long mailbox name to the STATUS command. A long mailbox name argument will cause a stack based buffer overflow, providing the attacker with full control over the saved return address on the stack.

tags | advisory, remote, overflow, arbitrary, imap
advisories | CVE-2005-1256
SHA-256 | b52c4eafcf24128417eb48204d02e859bd572c5f3adf53efcaf617cddcf64290
halocombat.txt
Posted Aug 14, 2005
Authored by Luigi Auriemma | Site aluigi.altervista.org

A vulnerability in Halo: Combat Evolved versions 1.06 and below and Custom Edition 1.00 can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
SHA-256 | 3bac6e930e7192cb2524eed969e3949d1fcc3673e20aaafdb5adefd1f157937f
exim-exploit-idefense.c
Posted Aug 14, 2005
Authored by plugger

Local exploit for Exim 4.40.

tags | exploit, local
SHA-256 | 3adad43468cfdfd5ed6651714bdec7ccbbcdfc0f919cf2bda7401afbde47c960
comersusXSSsql.txt
Posted Aug 14, 2005
Authored by Lostmon

Spread The Word, a Comersus based bookstore, is susceptible to multiple cross site scripting and SQL injection flaws.

tags | exploit, xss, sql injection
SHA-256 | 57696cdb63045dd868bfebec4811e33ab2334d0c93c9fda6c902d855e90e7acf
ACROS Security Problem Report 2005-05-24.1
Posted Aug 14, 2005
Authored by Mitja Kolsek, ACROS Security | Site acrossecurity.com

WebLogic Server and WebLogic Express, Service Pack 4, are susceptible to cross site scripting flaws.

tags | advisory, xss
SHA-256 | 2619b3310f3c47e89eec1626a229bb5d830f5decc8011308daf41b04d6db1c6a
ACROS Security Problem Report 2005-05-24.2
Posted Aug 14, 2005
Authored by Mitja Kolsek, ACROS Security | Site acrossecurity.com

WebLogic Server and WebLogic Express, Service Pack 4, suffer from an HTML injection vulnerability.

tags | advisory
SHA-256 | 4e1a06fc9b94d88a2cec7ac59f0f8068f2d468c16b54bafaf9f0330407427003
gforgeexec.txt
Posted Aug 14, 2005
Authored by Filippo Spike Morelli

GForge versions below 4.0 suffer from a remote code execution flaw.

tags | exploit, remote, code execution
SHA-256 | 77fe7ff7bd06b439229afd0c78e13bddeb8127ba34471e9eb815bd3617ef2cc6
bluecoat7111.txt
Posted Aug 14, 2005
Authored by Oliver Karow | Site oliverkarow.de

Blue Coat Reporter 7.1.1.1 suffers from privilege escalation, HTML injection, and cross site scripting flaws.

tags | exploit, xss
SHA-256 | 0e820990b63dcfc03f6876ce9d4006e72b5302f20bb062b66e2d40e08bccc29b
ZyxelIPHandling.txt
Posted Aug 14, 2005
Authored by Federico Kirschbaum | Site infobyte.com.ar

The Zyxel Prestige 650R-31 ADSL router is susceptible to a denial of service attack using fragmented packets.

tags | exploit, denial of service
SHA-256 | 3da030dc02b25df10685ac38fd1f25703236e1b26958917084213d417472f0ef
sambarXSS.txt
Posted Aug 14, 2005
Authored by Jamie Fisher

Sambar Server 6.2 is susceptible to multiple cross site scripting flaws.

tags | exploit, xss
SHA-256 | fd9a1e7e059ac74e0f65f85e40b9cd8ce78d46a468b43363cb4a92ba0d13f957
net-snmp-05182005.txt
Posted Aug 14, 2005
Authored by Eric Romang

net-snmp fixproc contains a security flaw that allows a malicious local attacker the ability to execute arbitrary commands with root privileges.

tags | advisory, arbitrary, local, root
SHA-256 | e45fb19f19ec442e148803aa640b440b3b0b5470ff6e7fbd34aec296f42a3019
warking.txt
Posted Aug 14, 2005
Authored by Luigi Auriemma | Site aluigi.altervista.org

Warrior Kings 1.3 and below and Warrior Kings: Battles 1.23 and below suffer from format string vulnerabilities.

tags | advisory, vulnerability
SHA-256 | f404dcbc41bc0647bdb271e3dc2e805c773c4f7afe035d0b957a73eae9ffdafd
caVuln.txt
Posted Aug 14, 2005
Authored by Alex Wheeler | Site rem0te.com

Computer Associates Vet library provides antivirus scan engine capabilities. Vet scan engines allow products to analyze various streams for malware. Vet is vulnerable to an integer wrap during the analysis of an OLE stream. The integer wrap causes an arbitrary heap overflow with no character restrictions allowing remote attackers control of the system(s) Vet is protecting.

tags | advisory, remote, overflow, arbitrary
SHA-256 | c4e6ac4f3f3118a3c7dcd8f30132e256ee811e86703d139084b225e408b0b4fc
f3r4.txt
Posted Aug 14, 2005
Authored by F3R4_R4PP3R

INMOLUXE Premium 2.0 is susceptible to SQL injection attacks.

tags | exploit, sql injection
SHA-256 | 586957eb4953b9a8f1421bf4a9446c2210452bb208317345005ecfb2ee733984
cookiec_advisory.txt
Posted Aug 14, 2005
Site soulblack.com.ar

Cookie Cart Shopping is susceptible to remote password hash extraction.

tags | advisory, remote
SHA-256 | 0ce1029e80556b205972414f257b404113a48da5ea46e74dc6f33b41af192ce7
portail13.txt
Posted Aug 14, 2005
Site svt.nukleon.us

PortailPHP version 1.3 suffers from SQL injection flaws.

tags | exploit, sql injection
SHA-256 | 720340569373ed8a8af7f1e29cc638016faeb2e67cd06a0c6304b37d7526da84
wga.txt
Posted Aug 14, 2005
Authored by Debasis Mohanty | Site hackingspirits.com

This proof of concept explains how Microsoft WGA validation check can be defeated and any Microsoft product with the WGA validation feature can be run and installed on machines running a pirated copy of Windows XP.

tags | advisory, proof of concept
systems | windows
SHA-256 | f0ce619089e25cac5ce67e00f1bbdd6bcafd35a9367e9e68693cf0d792c122b2
postnukeSQL0760rc3.txt
Posted Aug 14, 2005
Authored by Maksymilian Arciemowicz

Postnuke versions 0.760RC3 and below suffer from SQL injection attacks.

tags | exploit, sql injection
SHA-256 | d3af81e0fc22d49f4eaec7866a406567c5653a2db0e52361ec350a5075b14188
Page 3 of 5
Back12345Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close